Authentication tokens aren't actual physical tokens, of course. But when these digital identifiers aren't expired regularly or pinned for use by a specific device only, they may as well be made of ...
AiTM attacks don't steal passwords; they copy the result of a real login. You need to watch what happens after the user logs ...